[cv]----- [interests]----- [main]----- [company]---- [e-business]
Search With Google
  
My Links

  • CV

  • Interests

  • Company

  • E-business

  • Links

  • E-mail
  • Security Products


    In this part of my site you will find details on my security products.



    [About Us]------------------ [our expertise]------------------ [Useful links]


    The Security Challenge

    Internet risks are increasing as more enterprises connect with customers, partners, vendors and employees via the Web, exposing business systems and information to online risk. Each day, new vulnerabilities in software are discovered and new online attacks that bypass traditional security products like firewalls and anti-virus are unleashed. Adding to the pressure, contractual relationships and government regulations now require organizations to meet new standards of information security.

    In response to these challenges, Apache Security offers a simple and truly integrated solution that puts preemptive protection within the reach of all security-conscious organizations. It provides end-to-end coverage of the enterprise with solutions for desktops, servers, networks and gateways. We call this product the Business and Internet Security protection package ver.1 (BIS pro 1).

    Apache advanced security products are available as stand-alone products or together in an integrated security system. Apache incorporates advanced intrusion prevention, firewall, VPN, vulnerability scanning and anti-virus, as well as mail security and Web filtering.


    Why we need anti-virus protection?

    Computer viruses are mysterious and grab our attention. On the one hand, viruses show us how vulnerable we are. A properly engineered virus can have an amazing effect on the worldwide Internet. On the other hand, they show how sophisticated and interconnected human beings have become.

    For example, the thing making big news right now is the Mydoom worm, which experts estimate infected approximately a quarter-million computers in a single day (Times Online). Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. That's pretty impressive when you consider that the Melissa and ILOVEYOU viruses are incredibly simple


    Types of Infection
    When you listen to the news, you hear about many different forms of electronic infection.
    The most common are:
    • Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
    • E-mail viruses - An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.
    • Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
    • Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
    An Ounce of Prevention
    You can protect yourself against viruses with a few simple steps:
    • If you are truly worried about traditional (as opposed to e-mail) viruses, you should be running a more secure operating system like UNIX. You never hear about viruses on these operating systems because the security features keep viruses (and unwanted human visitors) away from your hard disk.
    • If you are using an unsecured operating system, then buying virus protection software is a nice safeguard.
    • If you simply avoid programs from unknown sources (like the Internet), and instead stick with commercial software purchased on CDs, you eliminate almost all of the risk from traditional viruses. In addition, you should disable floppy disk booting -- most computers now allow you to do this, and that will eliminate the risk of a boot sector virus coming in from a floppy disk accidentally left in the drive.
    • You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you should NEVER run macros in a document unless you know what they do. There is seldom a good reason to add macros to a document, so avoiding all macros is a great policy.
    • You should never double-click on an attachment that contains an executable that arrives as an e-mail attachment. Attachments that come in as Word files (.DOC), spreadsheets (.XLS), images (.GIF and .JPG), etc., are data files and they can do no damage (noting the macro virus problem in Word and Excel documents mentioned above). A file with an extension like EXE, COM or VBS is an executable, and an executable can do any sort of damage it wants. Once you run it, you have given it permission to do anything on your machine. The only defense is to never run executables that arrive via e-mail.

    Overall purchasing security products is an inexpensive way of safeguarding your computer. Viruses can cause huge amount of problems to your computer and leave you with a huge bill for repair. So why not buy yourself a security product for as little as €69.99 and be secure in mind that your computer is safe against all sorts of threats. With the advent of broadband it is even a greater risk as people can now invade your PC with greater ease than ever before. So do yourself and your PC a favour and Click Here.

    security

    Product Information

    Portability and the Internet

    Music and File Sharing

    Removable Storage

    Security Products


    [cv]--- [interests]--- [main]--- [company]--- [e-business]

    Created in 2005
    [e-mail webmaster]
    made by Smiley

    Copyright © 2005,Gavin White, All Rights Reserved.
    1